General
-
Target
IDAT_final_payload_ugkgcy.bin
-
Size
66KB
-
MD5
6610ac640e59b5441394f8d044ec297b
-
SHA1
642e696f68556bc6629d2c96f96001001cef74a5
-
SHA256
88ec27163778e96ccc5ea7ce1d072d1fa0a7dfabbdc41d914f77ae02e6e446df
-
SHA512
0f6e754c3dd69e4ee79e18d6e466b49aa9196e5af60ccd10284c648c7acf419d031a8083950e0b45e8d34a324529bd736c6f6cbaea36ecee06ceb44bcfbff10f
-
SSDEEP
1536:MOLTEn+vYk+Ls0Ku3UYFt2EHb/MECNWYdHrQTGtxJ:MOXa+vYk+7Ku3UYFt2Wb/HC1dHGmxJ
Malware Config
Extracted
asyncrat
| CRACKED BY https://t.me/xworm_v2
Default
melo2024.kozow.com:8000
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_file
AnsyFelix
-
install_folder
%AppData%
Signatures
Files
-
IDAT_final_payload_ugkgcy.bin.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ